/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bf/ |
H A D | bf_skey.c | 68 BF_LONG *p,ri,in[2]; local 81 ri= *(d++); 84 ri<<=8; 85 ri|= *(d++); 88 ri<<=8; 89 ri|= *(d++); 92 ri<<=8; 93 ri|= *(d++); 96 p[i]^=ri;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_env.c | 116 int CMS_RecipientInfo_type(CMS_RecipientInfo *ri) argument 118 return ri->type; 151 CMS_RecipientInfo *ri = NULL; local 161 ri = M_ASN1_new_of(CMS_RecipientInfo); 162 if (!ri) 167 ri->d.ktri = M_ASN1_new_of(CMS_KeyTransRecipientInfo); 168 if (!ri->d.ktri) 170 ri->type = CMS_RECIPINFO_TRANS; 172 ktri = ri->d.ktri; 207 0, ri); 236 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument 259 CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 276 CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 287 CMS_RecipientInfo_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pkey) argument 301 cms_RecipientInfo_ktri_encrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri) argument 366 cms_RecipientInfo_ktri_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri) argument 434 CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, const unsigned char *id, size_t idlen) argument 479 CMS_RecipientInfo *ri = NULL; local 584 CMS_RecipientInfo_kekri_get0_id(CMS_RecipientInfo *ri, X509_ALGOR **palg, ASN1_OCTET_STRING **pid, ASN1_GENERALIZEDTIME **pdate, ASN1_OBJECT **potherid, ASN1_TYPE **pothertype) argument 621 CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key, size_t keylen) argument 640 cms_RecipientInfo_kekri_encrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri) argument 700 cms_RecipientInfo_kekri_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri) argument 779 CMS_RecipientInfo_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri) argument 800 CMS_RecipientInfo *ri; local [all...] |
H A D | cms_smime.c | 612 CMS_RecipientInfo *ri; local 617 ri = sk_CMS_RecipientInfo_value(ris, i); 618 if (CMS_RecipientInfo_type(ri) != CMS_RECIPINFO_TRANS) 623 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0)) 625 CMS_RecipientInfo_set0_pkey(ri, pk); 626 r = CMS_RecipientInfo_decrypt(cms, ri); 627 CMS_RecipientInfo_set0_pkey(ri, NULL); 650 CMS_RecipientInfo *ri; local 655 ri = sk_CMS_RecipientInfo_value(ris, i); 656 if (CMS_RecipientInfo_type(ri) ! [all...] |
H A D | cms.h | 189 int CMS_RecipientInfo_type(CMS_RecipientInfo *ri); 193 int CMS_RecipientInfo_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pkey); 194 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 195 int CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, 198 int CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, 209 int CMS_RecipientInfo_kekri_get0_id(CMS_RecipientInfo *ri, 216 int CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, 219 int CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, 222 int CMS_RecipientInfo_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri);
|
H A D | cms_asn1.c | 222 CMS_RecipientInfo *ri = (CMS_RecipientInfo *)*pval; 223 if (ri->type == CMS_RECIPINFO_TRANS) 225 CMS_KeyTransRecipientInfo *ktri = ri->d.ktri; 231 else if (ri->type == CMS_RECIPINFO_KEK) 233 CMS_KEKRecipientInfo *kekri = ri->d.kekri;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_mont.c | 181 int al,nl,max,i,x,ri; local 184 /* mont->ri is the size of mont->N in bits (rounded up 186 al=ri=mont->ri/BN_BITS2; 244 /* mont->ri will be a multiple of the word size and below code 245 * is kind of BN_rshift(ret,r,mont->ri) equivalent */ 246 if (r->top <= ri) 251 al=r->top-ri; 255 if (bn_wexpand(ret,ri) == NULL) return(0); 256 x=0-(((al-ri)>>(sizeo [all...] |
H A D | bn.h | 313 int ri; /* number of bits in R */ member in struct:bn_mont_ctx_st
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_doit.c | 141 static int pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, argument 150 pkey = X509_get_pubkey(ri->cert); 163 EVP_PKEY_CTRL_PKCS7_ENCRYPT, 0, ri) <= 0) 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); 201 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey) 217 EVP_PKEY_CTRL_PKCS7_DECRYPT, 0, ri) <= 0) 224 ri->enc_key->data, ri->enc_key->length) <= 0) 236 ri->enc_key->data, ri 200 pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey) argument 265 PKCS7_RECIP_INFO *ri=NULL; local 401 pkcs7_cmp_ri(PKCS7_RECIP_INFO *ri, X509 *pcert) argument 425 PKCS7_RECIP_INFO *ri=NULL; local 1095 PKCS7_RECIP_INFO *ri; local [all...] |
H A D | pk7_lib.c | 485 void PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc) argument 488 *penc = ri->key_enc_algor; 493 PKCS7_RECIP_INFO *ri; local 495 if ((ri=PKCS7_RECIP_INFO_new()) == NULL) goto err; 496 if (!PKCS7_RECIP_INFO_set(ri,x509)) goto err; 497 if (!PKCS7_add_recipient_info(p7,ri)) goto err; 498 return ri; 500 if (ri) 501 PKCS7_RECIP_INFO_free(ri); 505 int PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri) argument [all...] |
H A D | pk7_asn1.c | 177 PKCS7_RECIP_INFO *ri = (PKCS7_RECIP_INFO *)*pval; 178 X509_free(ri->cert);
|
H A D | pkcs7.h | 340 void PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc); 341 int PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | t_req.c | 96 X509_REQ_INFO *ri; local 112 ri=x->req_info; 120 neg=(ri->version->type == V_ASN1_NEG_INTEGER)?"-":""; 122 for (i=0; i<ri->version->length; i++) 123 { l<<=8; l+=ri->version->data[i]; } 131 if (X509_NAME_print_ex(bp,ri->subject,nmindent, nmflags) < 0) goto err; 140 if (i2a_ASN1_OBJECT(bp, ri->pubkey->algor->algorithm) <= 0)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ms/ |
H A D | speed32.bat | 18 perl Configure bl-4c-ri 25 perl Configure b2-is-ri-dp
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/util/ |
H A D | speed.sh | 25 perl Configure bl-4c-ri 30 perl Configure b2-is-ri-dp
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509_req.c | 73 X509_REQ_INFO *ri; local 84 ri=ret->req_info; 86 ri->version->length=1; 87 ri->version->data=(unsigned char *)OPENSSL_malloc(1); 88 if (ri->version->data == NULL) goto err; 89 ri->version->data[0]=0; /* version == 0 */
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | cms.h | 189 int CMS_RecipientInfo_type(CMS_RecipientInfo *ri); 193 int CMS_RecipientInfo_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pkey); 194 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 195 int CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, 198 int CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, 209 int CMS_RecipientInfo_kekri_get0_id(CMS_RecipientInfo *ri, 216 int CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, 219 int CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, 222 int CMS_RecipientInfo_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri);
|
H A D | pkcs7.h | 340 void PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc); 341 int PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri);
|
H A D | bn.h | 313 int ri; /* number of bits in R */ member in struct:bn_mont_ctx_st
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_srv.c | 132 OCSP_REVOKEDINFO *ri; local 163 if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new())) goto err; 164 if (!ASN1_TIME_to_generalizedtime(revtime, &ri->revocationTime)) 168 if (!(ri->revocationReason = ASN1_ENUMERATED_new())) 170 if (!(ASN1_ENUMERATED_set(ri->revocationReason,
|
/barrelfish-2018-10-04/lib/libc/db/btree/ |
H A D | bt_debug.c | 152 RINTERNAL *ri; local 195 ri = GETRINTERNAL(h, cur); 197 ri->nrecs, ri->pgno);
|
/barrelfish-2018-10-04/lib/procon/ |
H A D | procon.c | 778 uint64_t ri = spp->c_read_id; local 779 // swapping the slot_data contents between ri and new_slot 783 cache_flush_range(&spp->sp->slot_list[ri], SLOT_SIZE); 786 sp_copy_slot_data(&tmp, &spp->sp->slot_list[ri].d); 787 sp_copy_slot_data(&spp->sp->slot_list[ri].d, new_slot); 791 cache_flush_range(&spp->sp->slot_list[ri], SLOT_SIZE); 795 if(!sp_set_read_index(spp, ((ri + 1) % spp->c_size))) {
|
/barrelfish-2018-10-04/lib/pcre/ |
H A D | pcre_dfa_exec.c | 2792 dfa_recursion_info *ri; local 2806 for (ri = md->recursive; ri != NULL; ri = ri->prevrec) 2807 if (recno == ri->group_num && ptr == ri->subject_position)
|
H A D | pcre_exec.c | 1755 recursion_info *ri; local 1766 for (ri = md->recursive; ri != NULL; ri = ri->prevrec) 1767 if (recno == ri->group_num && eptr == ri->subject_position)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | ca.c | 2253 X509_REQ_INFO *ri; local 2300 ri=req->req_info; 2301 n = ri->subject;
|